Friday, May 4, 2012

Microsoft boots Chinese firm for leaking exploit

Computerworld Security: May 04, 2012
===============================================================

Microsoft boots Chinese firm for leaking exploit

Microsoft identified a Chinese security partner as the source of a leak last
March in its highly restricted vulnerability information-sharing program.
http://cwonline.computerworld.com/t/7985677/823929835/562195/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Imation Scalable Storage~~~~~~~~~~~~~~~~~~~~~

7 Simple Truths About Tiering Your Data

Dealing with the explosion of extreme data means more than containing it all.
It's about determining what data is most useful to your business and where
"speed meets need." Learn how you can use data tiering to transform unstructured
data into "content" while keeping protection high and costs low.

http://cwonline.computerworld.com/t/7985677/823929835/562196/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Microsoft plans big May patch slate for next week
http://cwonline.computerworld.com/t/7985677/823929835/562197/0/

2. Mobile experts disagree on who should protect privacy
http://cwonline.computerworld.com/t/7985677/823929835/562198/0/

3. The 10 worst Web application-logic flaws that hackers love to abuse
http://cwonline.computerworld.com/t/7985677/823929835/562199/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Imation Scalable Storage~~~~~~~~~~~~~~~~~~~~~

A Scalable Approach To SMB Data Protection

Now that data has become an indispensable asset to your business, you can't
afford to ignore it. Learn why an Imation RDX solution is the perfect scalable
solution for SMBs with limited resources.

http://cwonline.computerworld.com/t/7985677/823929835/562200/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Microsoft plans big May patch slate for next week

Microsoft today said it would ship seven security updates next week, three
critical, to patch 23 bugs in Windows, Office and its Silverlight and .Net
development platforms.
http://cwonline.computerworld.com/t/7985677/823929835/562197/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Trend Micro~~~~~~~~~~~~~~~~~~~~~

Handling the Surge of Personal Mobile Devices

The consumerization of mobile devices, also known as BYOD (Bring Your Own
Device), is unstoppable. Get tips to embrace this movement without compromising
security. Learn how lightweight security agents can secure user-owned mobile
devices without device-side signature files that can degrade performance.

http://cwonline.computerworld.com/t/7985677/823929835/562201/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mobile experts disagree on who should protect privacy

Users of mobile apps need more information about the ways those apps use their
personal information, a group of experts agreed Thursday, but they didn't agree
on who is most responsible for protecting user privacy.
http://cwonline.computerworld.com/t/7985677/823929835/562198/0/

The 10 worst Web application-logic flaws that hackers love to abuse

Hackers are always hunting to find business-logic flaws, especially on the Web,
in order to exploit weaknesses in online ordering and other processes. NT
OBJECTives, which validates Web application security, says these are the top 10
business-logic flaws they see all the time.
http://cwonline.computerworld.com/t/7985677/823929835/562199/0/



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CALL FOR ENTRIES -- COMPUTERWORLD'S BUSINESS INTELLIGENCE BEST IN CLASS 2012

If your organization's BI project is innovative, has positively impacted your
business and has produced ROI, then we want to see your case study!

In our upcoming Aug. 27 issue, we will showcase a select group of the biggest
(and most fascinating) business decisions to which BI has contributed. Case
study submissions will be accepted now through May 7. Submit your nomination
here:

http://cwonline.computerworld.com/t/7985677/823929835/558910/0/

SHARK TANK OF THE DAY
______________________

Nice try, though

This data warehouse manager pilot fish is responsible for a set of vital reports
that are run every night and delivered by email to his company's top execs, from
the CEO on down. So when he gets a call at 5 a.m., he gets right on the problem.

http://cwonline.computerworld.com/t/7985677/823929835/562202/0/

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Omissions from the feature set of Windows RT are leaving analysts increasingly
skeptical that enterprises will gravitate toward tablets running the new forked
version of Windows. Is Windows RT on tablets DOA because it lacks needed
enterprise features?

http://cwonline.computerworld.com/t/7985677/823929835/560675/0/

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and
take on new tasks. But the vast majority are still happy they picked IT as their
career.

http://cwonline.computerworld.com/t/7985677/823929835/558670/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7985677/823929835/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7985677/823929835/311619/0/

Facebook: http://cwonline.computerworld.com/t/7985677/823929835/311620/0/

Twitter: http://cwonline.computerworld.com/t/7985677/823929835/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan98@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7985677/823929835/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03OTg1Njc3&x=5b0ca26c

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7985677/823929835/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7985677/823929835/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7985677/823929835/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:51 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive